CVE-2024-20439

Scores

EPSS

0.863high86.3%
0%20%40%60%80%100%

Percentile: 86.3%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential.
This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

798CWE-912

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-20439

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: smart_license_utility

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:cisco:smart_license_utility:*:*:*:*:*:*:*:*",      "versionEndExcluding": "2.3.0",      "versionStartIncluding": "2.0.0",      "vulnerable": tr...

Source: nvd

End of list